Principles of Information Systems (MindTap Course List)
13th Edition
ISBN: 9781305971776
Author: Ralph Stair, George Reynolds
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 14.1, Problem 2CTQ
Program Plan Intro
- The information system resources are shown below:
- People Resources:
- People are vital for information
system operations. - It includes end users as well as IS specialists.
- The end users use an information system or data it produces.
- The IS specialists develop as well as operate information systems.
- It includes system analysts, computer operators as well as clerical IS personnel.
- People are vital for information
- Hardware Resources:
- It comprises physical devices as well as materials used for information processing.
- It includes machines, such as computers and other equipment plus data media.
- The computer systems contain central processing unit that has microprocessors and different interconnected devices.
- The computer peripherals are devices such as keyboard, mouse and disks for storage.
- Software Resources:
- It includes all set of instructions for information processing.
- It contains set of operating instructions named programs that directs and controls computer hardware.
- Each system contains a software resource component.
- It denotes instructions for information processing.
- Data Resources:
- The data required for operations is considered as data resources.
- It must be used effectively for benefitting all end users.
- It includes image data, audio data, human voice and other forms.
- People Resources:
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
The term "responsibility" refers to the act of determining whether or not a person is responsible for his or her own actions. Which of the following is the most secure option? It is critical that you provide an explanation for your behavior.
Discuss the benefits, drawbacks, concerns, and ethics of hacktivism. Questions which could be examined include: Is it an effective political tool? Is it an ethical one? How can hacktivism be weaponized? What are the ethical conflicts involved and how do you weigh them? What are the legal ramifications? Should those ramifications be enforced? Are there times where hacktivism has gone too far (even if you personally agree with the cause)?
What does it mean to you to be on the safe side of things? Maintaining one's
safety in the real world is becoming an increasingly challenging endeavor. Is it
conceivable for a single assault on the infrastructure of an organization to
take on a number of diverse forms?
Chapter 14 Solutions
Principles of Information Systems (MindTap Course List)
Ch. 14.1 - What is the harm in nonproductive use of...Ch. 14.1 - Prob. 2RQCh. 14.1 - Do you think that it would help to involve a small...Ch. 14.1 - Prob. 2CTQCh. 14.2 - Prob. 1RQCh. 14.2 - Prob. 2RQCh. 14.2 - Prob. 1CTQCh. 14.2 - Prob. 2CTQCh. 14.3 - Prob. 1RQCh. 14.3 - Prob. 2RQ
Ch. 14.3 - Prob. 1CTQCh. 14.3 - Prob. 2CTQCh. 14.4 - Prob. 1RQCh. 14.4 - Prob. 2RQCh. 14.4 - Prob. 1CTQCh. 14.4 - Prob. 2CTQCh. 14 - Prob. 1SATCh. 14 - Prob. 2SATCh. 14 - Prob. 3SATCh. 14 - Prob. 4SATCh. 14 - Prob. 5SATCh. 14 - Prob. 6SATCh. 14 - Prob. 7SATCh. 14 - Prob. 8SATCh. 14 - Prob. 9SATCh. 14 - Prob. 10SATCh. 14 - Prob. 11SATCh. 14 - Prob. 12SATCh. 14 - Prob. 13SATCh. 14 - Prob. 14SATCh. 14 - Prob. 15SATCh. 14 - Prob. 16SATCh. 14 - Prob. 1RQCh. 14 - Prob. 2RQCh. 14 - Prob. 3RQCh. 14 - Prob. 4RQCh. 14 - Prob. 5RQCh. 14 - Prob. 6RQCh. 14 - Prob. 7RQCh. 14 - Prob. 8RQCh. 14 - Prob. 9RQCh. 14 - Prob. 10RQCh. 14 - Prob. 11RQCh. 14 - Prob. 12RQCh. 14 - Prob. 1DQCh. 14 - Prob. 2DQCh. 14 - Prob. 3DQCh. 14 - Prob. 4DQCh. 14 - Prob. 5DQCh. 14 - Prob. 6DQCh. 14 - Prob. 7DQCh. 14 - Prob. 8DQCh. 14 - Prob. 9DQCh. 14 - Prob. 10DQCh. 14 - Prob. 1PSECh. 14 - Prob. 1TACh. 14 - Imagine that your team has been hired to conduct a...Ch. 14 - Prob. 3TACh. 14 - Prob. 1WECh. 14 - Prob. 2WECh. 14 - Prob. 3WECh. 14 - Prob. 1CECh. 14 - Prob. 2CECh. 14 - Prob. 3CECh. 14 - Prob. 1CTQ1Ch. 14 - Prob. 2CTQ1Ch. 14 - Prob. 3CTQ1Ch. 14 - Prob. 1CTQ2Ch. 14 - Prob. 2CTQ2Ch. 14 - Prob. 3CTQ2
Knowledge Booster
Similar questions
- In the future, it will be increasingly typical to use ethical reasoning in the job.arrow_forwardIs there anything that can be done by an employer to lessen the likelihood of illegal activities occurring on the job? Discuss?arrow_forwardIdentity theft is a frequent kind of criminal activity that, regrettably, is on the rise owing to the widespread use of the internet. Please describe the many techniques that hackers may use to steal your identity as well as the precautionary steps that, in your view, ought to be taken to ensure that this doesn't happen.arrow_forward
- What form of security measure would be most successful in deterring deliberate assaults if there were no rules mandating workers to take breaks or split their work?arrow_forwardThe three main categories of immoral and illegal behaviour should be mentioned. Give examples to illustrate each categoryarrow_forwardUse an online search engine to locate a peer-reviewed journal article with at least 100 citations that examines the hazards of working inside vs outside of an organisation. Is there a change in either type or an explanation for the shift in the paper's subject matter? In your opinion, which of the two categories is more difficult to avoid and why?arrow_forward
- Do you believe that reading a piece of writing and judging it based on a preset set of criteria is a helpful strategy to prevent oneself from being misled by fake news and other forms of disinformation? What gives you reason to think that this is the situation?arrow_forwardoung, technically oriented hackers argued that, if the owners of a computer system want to keep outsiders out, it is their responsibility to provide better security. Ken Thompson, one of the inventors of UNIX, said, "The act of breaking into a computer system has to have the same social stigma as breaking into a neighbor’s house. It should not matter that the neighbor’s door is unlocked." Which position do you agree with more? Give your reasonsarrow_forwardAfter reading the case presented in the module, write a short response to the following discussion questions and ethical decision making scenario. 1. Discussion Questions Do you think the response of the company so far indicates any flaws in company policy or practices that are revealed in the incident?arrow_forward
- For the first part, please create an imaginary situation where a student has been accused of plagiarism (or any other form of cheating). Let us know what the student is accused of doing, but more importantly, tell us about that student's life - what stresses them out, what demands are there on their time, etc. Help us to understand why your imaginary student may have made the choice to cheat. Allow this imaginary student to defend themselves. For the second part, create an imaginary response to the student's defense from the perspective of a faculty member or other individual involved in investigating the accusation. Consider what the student told you about their circumstances and their choice to cheat; and then tell us what you, as a professor, would choose to do, and what "punishment," if any, the student should receive.arrow_forwardAfter reading the case presented in the module, write a short response to the following discussion questions and ethical decision making scenario. Discussion Questions Before the discussion at the start of this chapter, how do Fred, Gladys, and Charlie each perceive the scope and scale of the new information security effort? Did Fred’s perception change after that? How should Fred measure success when he evaluates Gladys’ performance for this project? How should he evaluate Charlie’s performance? Which of the threats discussed in this chapter should receive Charlie’s attention early in his planning process?arrow_forwardWhat kind of training should be provided to workers so that the likelihood of "rules of behaviour" being ignored in the future is reduced?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning